Outsourcing Encrypted Excel Files

被引:2
作者
Li, Ya-Nan [1 ,2 ]
Wu, Qianhong [1 ]
Tang, Wenyi [3 ]
Qin, Bo [3 ,4 ]
Wang, Qin [1 ]
Miao, Meixia [5 ]
机构
[1] Beihang Univ, Sch Elect & Informat Engn, Beijing, Peoples R China
[2] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[3] Renmin Univ China, Sch Informat, Key Lab Data Engn & Knowledge Engn, Minist Educ, Beijing, Peoples R China
[4] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100093, Peoples R China
[5] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Peoples R China
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017 | 2017年 / 10701卷
关键词
Outsource data; Excel; Privacy; Operability; ACCESS-CONTROL; CLOUD; SEARCH;
D O I
10.1007/978-3-319-72359-4_30
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of cloud computing, the enterprises tend to outsource their data to the third party for saving cost and mobile access. However, simultaneously achieving the security and the operability of the outsourced data becomes a real challenge. Existing solutions mainly deal with the security of the outsourced data, but cannot support the operation of encrypted data at the same time, except for few kinds of operations. In this paper, we propose an outsourcing encrypted Excel file scheme, which supports most operations of the encrypted data, as if it were not encrypted in Excel. Based on extensive experimental tests, the system achieves the function of summing, seeking mean, searching, indexing. The analysis shows that our scheme can provide proper security in practice.
引用
收藏
页码:506 / 524
页数:19
相关论文
共 34 条
[1]  
[Anonymous], LNCS
[2]  
[Anonymous], 2014, P 9 ACM S INFORM, DOI DOI 10.1145/2590296.2590342
[3]  
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[5]  
Boneh D., 2006, P ACM C COMPUTER COM, P211
[6]  
Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
[7]  
Boneh D, 2006, LECT NOTES COMPUT SC, V4004, P573
[8]   Privacy-Preserving Multi-Keyword Ranked Search over Encrypted Cloud Data [J].
Cao, Ning ;
Wang, Cong ;
Li, Ming ;
Ren, Kui ;
Lou, Wenjing .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (01) :222-233
[9]   Supporting dynamic updates in storage clouds with the Akl-Taylor scheme [J].
Castiglione, Arcangelo ;
De Santis, Alfredo ;
Masucci, Barbara ;
Palmieri, Francesco ;
Huang, Xinyi ;
Castiglione, Aniello .
INFORMATION SCIENCES, 2017, 387 :56-74
[10]   Cryptographic Hierarchical Access Control for Dynamic Structures [J].
Castiglione, Arcangelo ;
De Santis, Alfredo ;
Masucci, Barbara ;
Palmieri, Francesco ;
Castiglione, Aniello ;
Huang, Xinyi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) :2349-2364